Seccion 1 Flashcards
(37 cards)
What is the main goal of Information Security?
Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction
Define Information Systems Security.
Protecting the systems (e.g., computers, servers, network devices) that hold and process critical data
What does the CIA Triad stand for?
- Confidentiality
- Integrity
- Availability
What is Confidentiality in the context of the CIA Triad?
Ensures information is accessible only to authorized personnel (e.g., encryption)
What does Integrity ensure?
Ensures data remains accurate and unaltered (e.g., checksums)
What is the purpose of Availability?
Ensures information and resources are accessible when needed (e.g., redundancy measures)
Define Non-Repudiation.
Guarantees that an action or event cannot be denied by the involved parties (e.g., digital signatures)
What is the CIANA Pentagon?
An extension of the CIA triad with the addition of non-repudiation and authentication
List the Triple A’s of Security.
- Authentication
- Authorization
- Accounting
What is the difference between Authentication and Authorization?
Authentication verifies the identity of a user or system; Authorization determines actions or resources an authenticated user can access
Identify the categories of Security Controls.
- Technical
- Managerial
- Operational
- Physical
What are the types of Security Controls?
- Preventative
- Deterrent
- Detective
- Corrective
- Compensating
- Directive
What is the Zero Trust Model?
Operates on the principle that no one should be trusted by default
What does the Control Plane in the Zero Trust Model include?
- Adaptive identity
- Threat scope reduction
- Policy-driven access control
- Secured zones
Define Threat in the context of cybersecurity.
Anything that could cause harm, loss, damage, or compromise to our information technology systems
What is a Vulnerability?
Any weakness in the system design or implementation
Where do threats and vulnerabilities intersect?
That is where the risk to your enterprise systems and networks lies
What is Risk Management?
Finding different ways to minimize the likelihood of an outcome and achieve the desired outcome
What are the five basic methods to ensure Confidentiality?
- Encryption
- Access Controls
- Data Masking
- Physical Security Measures
- Training and Awareness
What does Integrity ensure?
Helps ensure that information and data remain accurate and unchanged from its original state unless intentionally modified by an authorized individual
List the methods used to maintain Integrity.
- Hashing
- Digital Signatures
- Checksums
- Access Controls
- Regular Audits
What is the importance of Availability in cybersecurity?
Ensures that information, systems, and resources are accessible and operational when needed by authorized users
Define Redundancy in the context of Availability.
Duplication of critical components or functions of a system with the intention of enhancing its reliability
What are the types of Redundancy to consider in system design?
- Server Redundancy
- Data Redundancy
- Network Redundancy
- Power Redundancy